Cado Security
Cloud Investigation and Response Automation. Effortlessly gain forensic-level detail into cloud, container and serverless environments.
Popular repositories Loading
-
DFIR_Resources_REvil_Kaseya
DFIR_Resources_REvil_Kaseya PublicResources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack
-
CloudAndContainerCompromiseSimulator
CloudAndContainerCompromiseSimulator PublicSimulates a compromise in a cloud and container environment
Repositories
Showing 10 of 32 repositories
- varc Public archive
Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of particular use when investigating a security incident.
cado-security/varc’s past year of commit activity - yara-example Public
cado-security/yara-example’s past year of commit activity - cado-poc-eks-cluster Public
Easily create a simple EKS cluster for testing EKS acquisition in the Cado platform.
cado-security/cado-poc-eks-cluster’s past year of commit activity